Sciweavers

2669 search results - page 89 / 534
» Providing Contextual Information to Pervasive Computing Appl...
Sort
View
PERVASIVE
2009
Springer
14 years 2 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
IC
2010
13 years 5 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
JBI
2010
212views Bioinformatics» more  JBI 2010»
13 years 2 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
CHI
1995
ACM
13 years 11 months ago
Pointing the Way: Active Collaborative Filtering
Collaborative filtering is based on the premise that people looking for information should be able to make use of what others have already found and evaluated. Current collaborati...
David Maltz, Kate Ehrlich
PERVASIVE
2007
Springer
14 years 1 months ago
Ambient Interfaces that Motivate Changes in Human Behavior
Peripheral or ambient displays move information from the periphery to the center of human attention and back. Our research group is interested in the interaction and interface des...
Jodi Forlizzi, Ian Li, Anind K. Dey